Dahua 16CH 1U Lite AI PoE NVR

SKU: D-NVR4216-16P-I

AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles,




Listed for Support Purposes Only

 dahua technology

AI series products adopt the most advanced AI technologies, including deep learning algorithms that primarily target people and vehicles, which provides higher flexibility and accuracy for end-users. This enables the Dahua AI series to offer various advanced applications such as Face Recognition, ANPR, People Counting, traffic data statistics, etc.
The complete lineup of Dahua AI includes network (PTZ) cameras, network video recorders, servers, and platform management products. Beyond seeing the world, the power of AI allows devices to perceive the environment and understand the world in a better way.

Features:

  • 16 Channel IP video access
  • Smart H.265+/H.265/Smart H.264+/H.264/MJPEG
  • Up to 4 Channel perimeter protection
  • Up to 2 Channel video stream face recognition/8 channel picture stream face recognition ( with FD camera)
  • Up to 12 face pictures /sec processing
  • Up to 10 face databases with 20,000 face images in total
  • 1-8 PoE Ports support ePoE & EoC


Real Time Face Recognition
Video stream & picture stream real time face recognition. Facial attributes analysis features including gender, age, expression, glasses, moustache, mouth mask. Identify people and also capture, record faces with metadata. Facial feature filtering while real time display, only show faces with target features.

Face Database Management
Configurable multiple face databases. Powerful face database management. Face database can be applied to video channels independently. Name, gender, birthday, address, certificate type, certificate No., countries&regions and state can be added to each face picture. 

Common/Stranger Mode
NVR4000-I supports common and stranger mode. In stranger mode, when NVR detects a strange face(not in device's face database), it can trigger alarm, buzzer, snapshot, record, etc. Similarity threshold can be set manually. This function is developed for important infrastructure sites for which access control is critical.


Sign up for our newsletter

We only use your email address to add you to our mailing list for receiving our newsletters(monthly). This information is only kept in our mailing list and not for any other purposes than for contacting you with our newsletters.

Thank you for your submission! You will hear from us soon.